NEWS
Wireless AI paradox: complexity vs value
  • Posted on 16th April 2026 in by Sophie Milburn

Cisco’s report highlights Wi-Fi’s strategic role and the dual impact of AI on wireless ROI. Organisations that prioritise AI in wireless networks can gain a competitive advantage in network modernisation.

Read More
NEWS
Addressing OT downtime: financial impact and state of cybersecurity

New research highlights the financial impact of OT downtime in UK critical infrastructure, alongside ongoing challenges in incident remediation.

Read More
NEWS
ControlMonkey expands cloud configuration disaster recovery for improved resilience
  • Posted on 10th April 2026 in by Sophie Milburn

ControlMonkey augments its platform to protect and restore observability configurations, safeguarding monitoring environments during outages.

Read More
NEWS
Tata Consultancy Services extends partnership with Marks & Spencer
  • Posted on 10th April 2026 in by Sophie Milburn

Tata Consultancy Services has renewed its partnership with Marks & Spencer to support ongoing digital transformation initiatives, including the use of AI and other technologies aimed at improving retail operations and customer experience.

Read More
NEWS
Check Point launches AI defence plane for enhanced security

Check Point introduces the AI Defense Plane to safeguard enterprises as AI systems advance to...

Read More
NEWS
Next-gen collaboration: enhancing Vodafone's cable network

HUBER+SUHNER and Aurora Networks collaborate to enhance Vodafone’s cable network with next-gen...

Read More
NEWS
New leadership at CirrusHQ: Matt Smith appointed as Head of Sales

CirrusHQ appoints Matt Smith as Head of Sales to support its cloud partnerships and organisational...

Read More
NEWS
Advantech and SecEdge announce edge AI collaboration focused on security and deployment

Advantech and SecEdge collaborate to support security for AI models at the edge, including use in...

Read More
NEWS
Infosecurity Europe 2026: navigating geopolitics and cyber conflict

Infosecurity Europe 2026 will explore the impact of geopolitics on cybersecurity, featuring...

Read More
NEWS
StorMagic and HiveRadar edge computing solution for mobile environments

StorMagic partners with HiveRadar to deliver an edge computing solution for secure,...

Read More
NEWS
Keysight SBOM Manager to enhance software transparency and cybersecurity compliance

Keysight's SBOM Manager seeks to aid organisations in meeting global cybersecurity and software...

Read More
NEWS
Samsung Ads launches TotalView for unified TV ad reach measurement

Samsung Ads introduces TotalView to unify and enhance ad reach across linear and streaming TV...

Read More
NEWS
SentinelOne and Cloudflare introduce AI security integration

SentinelOne and Cloudflare integrate AI capabilities to support automated threat detection and...

Read More
NEWS
Ignition Technology expands into North America with Exclusive Networks

Ignition Technology collaborates with Exclusive Networks to expand its cybersecurity distribution...

Read More
NEWS
Barracuda Networks announces cybersecurity advancements to enhance partner success

Barracuda Networks has announced upgrades to its cybersecurity solutions and partner programs,...

Read More

Videos

Data Centre World 2026
Greg Gyves, Director of Global MSP & GSI at TeamViewer, explores the real operational pressures MSPs are dealing with. He highlights expanding service boundaries, rising complexity, and the constant push to do...
Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...

Expert Opinions

By Anna Marie Clifton, Director of Product, AI and Agents, at Zapier.
By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...